[go: up one dir, main page]

Follow
Michael Tunstall
Michael Tunstall
Cryptography Research
Verified email at cryptography.com
Title
Cited by
Cited by
Year
The sorcerer's apprentice guide to fault attacks
H Bar-El, H Choukri, D Naccache, M Tunstall, C Whelan
Proceedings of the IEEE 94 (2), 370-382, 2006
12792006
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
PK Agarwal, T Akutsu, A Amihood, A Apostolico, C Benham, G Benson, ...
Lecture notes in computer science (including subseries lecture notes in …, 2005
525*2005
Differential fault analysis of the advanced encryption standard using a single fault
M Tunstall, D Mukhopadhyay, S Ali
IFIP international workshop on information security theory and practices …, 2011
4762011
Key extraction from the primary side of a switched-mode power supply
S Saab, A Leiserson, M Tunstall
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-7, 2016
2702016
Fault analysis in cryptography
M Joye, M Tunstall
Springer, 2012
2682012
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J Longo, E De Mulder, D Page, M Tunstall
International Workshop on Cryptographic Hardware and Embedded Systems, 620-640, 2015
2182015
Round reduction using faults
H Choukri, M Tunstall
FDTC 5, 13-24, 2005
1432005
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
International conference on cryptology and information security in Latin …, 2012
1302012
Experimenting with Faults, Lattices and the DSA
D Naccache, P Nguyên, M Tunstall, C Whelan
Public Key Cryptography-PKC 2005, 16-28, 2005
1182005
Compiler Assisted Masking
A Moss, E Oswald, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems–CHES 2012, 58-75, 2012
1142012
Exponent recoding and regular exponentiation algorithms
M Joye, M Tunstall
International Conference on Cryptology in Africa, 334-349, 2009
942009
Differential power analysis of HMAC based on SHA-2, and countermeasures
R McEvoy, M Tunstall, CC Murphy, WP Marnane
International Workshop on Information Security Applications, 317-332, 2007
942007
Side-channel analysis of cryptographic software via early-terminating multiplications
J Großschädl, E Oswald, D Page, M Tunstall
International Conference on Information Security and Cryptology, 176-192, 2009
922009
Online template attacks
L Batina, Ł Chmielewski, L Papachristodoulou, P Schwabe, M Tunstall
Journal of Cryptographic Engineering 9 (1), 21-36, 2019
892019
Attacking smart card systems: Theory and practice
K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes
information security technical report 14 (2), 46-56, 2009
842009
Differential fault analysis of AES: towards reaching its limits
SS Ali, D Mukhopadhyay, M Tunstall
Journal of Cryptographic Engineering 3 (2), 73-97, 2013
762013
Efficient use of random delays in embedded software
M Tunstall, O Benoit
IFIP International Workshop on Information Security Theory and Practices, 27-38, 2007
762007
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
R Avanzi, S Hoerder, D Page, M Tunstall
Journal of Cryptographic Engineering 1 (4), 271-281, 2011
722011
Fault analysis of DPA-resistant algorithms
F Amiel, C Clavier, M Tunstall
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 223-236, 2006
682006
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
N Hanley, HS Kim, M Tunstall
Cryptographers’ Track at the RSA Conference, 431-448, 2015
662015
The system can't perform the operation now. Try again later.
Articles 1–20